Rhadamanthys

Entity category: PRODUCT

Business

LummaStealer Surges Following CastleLoader Malware Campaigns

A major resurgence of LummaStealer malware is being driven by sophisticated social engineering campaigns that use a technique called ClickFix…

Read More »
Business

Global Crackdown Intensifies on Cybercrime Networks

Global law enforcement is achieving unprecedented coordination, with major international operations dismantling cybercrime networks and seizing billions in illicit assets…

Read More »
BigTech Companies

Beware: Fake Windows Update Screens Spread ClickFix Malware

A deceptive malware campaign uses a fake Windows Update screen to trick users into manually executing malicious commands, leading to…

Read More »
BigTech Companies

Beware: Fake Windows Update Pushes Malware in ClickFix Attack

A deceptive cyberattack called ClickFix tricks users by mimicking a Windows security update, using a full-screen browser animation to install…

Read More »
Business

VPN Credentials Fuel 50% of Ransomware Attacks

Ransomware activity surged in Q3 2025, with compromised VPN credentials being the primary entry point for nearly half of all…

Read More »
Business

Dutch Police Seize 250 Servers in Bulletproof Hosting Crackdown

Dutch law enforcement dismantled a major bulletproof hosting service used exclusively by cybercriminals, seizing approximately 250 physical servers and taking…

Read More »
Business

Operation Endgame 3.0 Takes Down Three Major Malware Networks

Operation Endgame 3.0 dismantled three major malware networks—Rhadamanthys, VenomRAT, and Elysium—through a coordinated international law enforcement effort across eleven countries.…

Read More »
Business

Cybercriminals Lose Control: Rhadamanthys Infostealer Shut Down

The Rhadamanthys infostealer malware service has been disrupted, with criminal subscribers losing access to their data-collection servers, possibly due to…

Read More »
Business

TA585 Hackers Unleash Advanced New Attack Tools

TA585 is a sophisticated cybercriminal group known for its fully autonomous infrastructure, managing its own phishing campaigns, malware deployment, and…

Read More »